GHSL-2024-161, GHSL-2024-162The GitHub Security Lab team has identified potential security vulnerabilities in rembg.
We are committed to working with you to help resolve these issues. In this report you will find everything you need to effectively coordinate a resolution of these issues with the GHSL team.
If at any point you have concerns or questions about this process, please do not hesitate to reach out to us at securitylab@github.com (please include GHSL-2024-161 or GHSL-2024-162 as a reference). See also this blog post written by GitHub's Advisory Curation team which explains what CVEs and advisories are, why they are important to track vulnerabilities and keep downstream users informed, the CVE assigning process, and how they are used to keep open source software secure.
If you are NOT the correct point of contact for this report, please let us know!
rembg server is vulnerable to Server-Side Request Forgery (SSRF) and a weak default CORS configuration, which may allow an attacker website to send requests to servers on the internal network and view image responses.
rembg
/api/remove (GHSL-2024-161)The /api/remove endpoint takes a URL query parameter that allows an image to be fetched, processed and returned. An attacker may be able to query this endpoint to view pictures hosted on the internal network of the rembg server.
async def get_index(
url: str = Query(
default=..., description="URL of the image that has to be processed."
),
commons: CommonQueryParams = Depends(),
):
async with aiohttp.ClientSession() as session:
async with session.get(url) as response:
file = await response.read()
return await asyncify(im_without_bg)(file, commons)
This issue may lead to Information Disclosure.
Ensure that the IP address specified is not a local address. If resolving a domain name, ensure that the resolved IP address is not local.
curl -s "http://localhost:7000/api/remove?url=http://0.0.0.0/secret.png" -o output.png
GHSL-2024-162)The following CORS middleware is setup incorrectly. All origins are reflected, which allows any website to send cross site requests to the rembg server and thus query any API. Even if authentication were to be enabled, allow_credentials is set to True, which would allow any website to send authenticated cross site requests.
app.add_middleware(
CORSMiddleware,
allow_credentials=True,
allow_origins=["*"],
allow_methods=["*"],
allow_headers=["*"],
)
This issue may increase the severity of other vulnerabilities.
Create an allowlist of specific endpoints that can send cross site requests to the rembg server.
An attacker website can host the following code:
const response = await fetch("http://localhost:7000/api/remove?url=https://0.0.0.0/secret.jpg");
If a victim running rembg server were to access the attacker website, the attacker website could read the file secret.jpg from the server hosted on the victim's internal network.
We recommend you create a private GitHub Security Advisory for these findings. This also allows you to invite the GHSL team to collaborate and further discuss these findings in private before they are published.
These issues were discovered and reported by GHSL team member @Kwstubbs (Kevin Stubbings).
You can contact the GHSL team at securitylab@github.com, please include a reference to GHSL-2024-161 or GHSL-2024-162 in any communication regarding these issues.
This report is subject to a 90-day disclosure deadline, as described in more detail in our coordinated disclosure policy.
{
"cwe_ids": [
"CWE-918"
],
"github_reviewed_at": "2026-04-10T22:09:15Z",
"nvd_published_at": null,
"severity": "MODERATE",
"github_reviewed": true
}